Skip to content
Honeypot in cyber security

Honeypot

A honeypot is used in the area of computer and Internet security . It is a security resource, whose value lies in being probed, attacked or compromised. They are special decoy servers to catch the‚ Blackhats (people with evil and illegal intents). Honeypots attract the hackers to attack a vulnerable computer system, which is under observation, by a security team. All the information about the attackers is logged, and monitored.

working method of polymer memory

Polymer memory – a new way of using plastic as a secondary storage

A new memory technology promises to store more data at less cost than the expensive to build silicon chips used by popular consumer gadgets including digital cameras, cell phones and portable music players. The magical ingredient is not smaller transistors or an exotic material cooked up by the semiconductor industry. It is a plastic.

Security Requirements in Wireless Sensor Networks

Security requirements in Wireless Sensor Networks

The confidentiality objective is required in sensors environment to protect information traveling between the sensor nodes of the network or between the sensors and the base station from disclosure, since an adversary having the appropriate equipment may eavesdrop on the communication.

Mobile ad hoc network

Mobile Ad Hoc Network Routing Protocols and Applications

Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently.